Topic | Content and Assignments | Understanding |
Cryptography Basic | Number Theory Basics Tutorial and Practical Assignment | Symmetric and Asymmetric Cryptography Hashing Digital Signature Digital Certificate |
Basic Terminologies | Introduction to Threat, Attack, Virus, Worms, Trojan Horse, Bruteforce, Spoofing. | |
Security Fundamentals | Confidentiality, Integrity and Availability Non-Repudiaton and need of certificate User and Message Authentication | |
Webauthn | Registration and Authentication Process Drawbacks with the Password based Authentication | |
Honeypot | Need of it Different Types | |
Buffer Overflow Attack | Practice Stack and format string attack in C language | Stack Overflow Attack Format String Attack |
BadUSB | Introduction Attack Possibilities | |
SQL Injection | First Order and Second Order SQLi Prevention - Sanitization, Prepared statement/Stored Producedure | |
Trusted Platform Module | Storage and Operatios Hardware Security Module Secure Boot | |
IPSec | Implement using the Strongswan | ESP and AH Tunnel and Transport Mode |
SSL/TLS | Browser Task for https Connection Establishment Heartbleed attack on OpenSSL | |
Firewall | Practice IP Tables | Filtering Stages Basic Firewall Rules |
DNSSec | Iterative and Recursive Resolver Different attacks on DNS Certificate based Solution | |
Side Channel Analysis | Introduction Simple Power Analysis Meltdown and Spectre | |
Port Knocking | Usage NMAP |